搜索结果: 1-15 共查到“军队指挥学 Physical Unclonable Functions”相关记录15条 . 查询时间(0.078 秒)
Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems
Information theoretic security key agreement physical unclonable functions
font style='font-size:12px;'>
2019/7/8
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random l...
Secure and Reliable Key Agreement with Physical Unclonable Functions
information theory physical unclonable functions transform coding
font style='font-size:12px;'>
2018/5/30
Different transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrela...
Algebraic Security Analysis of Key Generation with Physical Unclonable Functions
Physical Unclonable Functions (PUFs) Fuzzy Extractor Coding Theory
font style='font-size:12px;'>
2016/12/10
Physical Unclonable Functions (PUFs) provide cryptographic keys for embedded systems without secure non-volatile key storage. Several error correction schemes for key generation with PUFs were introdu...
Physical Unclonable Functions based on Temperature Compensated Ring Oscillators
Physical unclonable function (PUF) delay-based PUF, RO-PUF
font style='font-size:12px;'>
2016/12/9
Physical unclonable functions (PUFs) are promising hardware security primitives suitable for low-cost cryptographic applications.Ring oscillator (RO) PUF is a well-received silicon PUF solution due to...
MEMS-based Gyroscopes as Physical Unclonable Functions
fingerprinting foundations
font style='font-size:12px;'>
2016/3/9
We are at the dawn of a hyper connectivity age otherwise known as the Internet of Things (IoT). It is widely accepted that to be able to reap all benefits from the IoT promise, device security will be...
How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search
Cryptography cryptographic key generation physical unclonable function (PUF)
font style='font-size:12px;'>
2016/1/5
We present an algorithm for repeatably generating keys using entropy from a Physical Unclonable Function (PUF). PUFs are logically identical physical constructs with Challenge-Response Pairs (CRPs) un...
Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators
applications Physical Unclonable Functions
font style='font-size:12px;'>
2015/12/29
This paper proposes a theoretical study and a full overview of the design, evaluation and optimization of a PUF based on transient element ring oscillators (TERO-PUF). We show how, by following some s...
Revisiting Optical Physical Unclonable Functions
implementation
font style='font-size:12px;'>
2013/4/18
We revisit optical physical unclonable functions (PUFs), which were introduced by Pappu et al. [36, 37] in their seminal and historically first publication on PUFs. We start our studies with non-integ...
A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions
Physical Unclonable Function Challenge Response
font style='font-size:12px;'>
2012/6/14
In this work, we propose a systematic method to evaluate and compare the performance of Physical Unclonable Functions (PUFs). The need for such a method is justified by the fact that various types of ...
A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions
Physical Unclonable Function Challenge Response Ring Oscillator Arbiter Parameter Performance
font style='font-size:12px;'>
2012/3/20
In this work, we propose a systematic method to evaluate and compare the performance of Physical Unclonable Functions (PUFs). The need for such a method is justified by the fact that various types of ...
On Foundation and Construction of Physical Unclonable Functions
Foundation Construction Physical Unclonable Functions
font style='font-size:12px;'>
2010/4/7
Physical Unclonable Functions (PUFs) have been introduced as a new cryptographic primitive,
and whilst a large number of PUF designs and applications have been proposed, few
studies has been underta...
Quantum readout of Physical Unclonable Functions:Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets
Physical Unclonable Functions Remote authentication authenticated Quantum Key Exchange
font style='font-size:12px;'>
2009/8/7
Physical Unclonable Functions (PUFs) are physical structures that are hard to clone and
have a unique challenge-response behaviour. The term PUF was coined by Pappu et al. in
2001. That work trigger...
Flowchart description of security primitives for Controlled Physical Unclonable Functions
security primitives Controlled Physical Unclonable Functions PUFs
font style='font-size:12px;'>
2009/7/14
Physical Unclonable Functions (PUFs) are physical ob-
jects that are unique, practically unclonable and that be-
have like a random function when subjected to a challenge.
Their use has been propos...
On the Foundations of Physical Unclonable Functions
Physical Unclonable Functions PUF Strong t-PUFs
font style='font-size:12px;'>
2009/6/15
We investigate the foundations of Physical Unclonable Functions from several perspectives.
Firstly, we discuss formal and conceptual issues in the various current definitions of PUFs. As
we argue, t...
SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions
SIMPL Systems Public Key Variant Physical Unclonable Functions
font style='font-size:12px;'>
2009/6/15
This paper theoretically discusses a novel security tool termed SIMPL system, which can be
regarded as a public key version of physical unclonable functions (PUFs). Like the latter, a
SIMPL system S...